CERT-In and Google Warn of Multiple Vulnerabilities in Google Chrome Desktop; High Risk to Billions, Here’s How to Stay Safe
A new advisory has raised concerns about Multiple Vulnerabilities in Google Chrome Desktop, warning that attackers could exploit these flaws to run malicious code remotely. The alert was issued by the Indian Computer Emergency Response Team (CERT-In) on November 21, 2025, and carries a high-severity rating.
Google Chrome is widely used across Windows, macOS and Linux. The flaws stem from type confusion in the V8 JavaScript engine. Attackers can exploit these weaknesses by tricking users into opening a specially crafted webpage. One vulnerability, CVE-2025-13223, is already being used in active attacks.
Who Is Affected
• Chrome versions prior to 142.0.7444.175/.176 on Windows
• Chrome versions prior to 142.0.7444.176 on Mac
• Chrome versions prior to 142.0.7444.175 on Linux
Individuals and organizations that rely on desktop versions of Chrome should treat this as a high-risk security issue.
How Multiple Vulnerabilities in Google Chrome Desktop Impact Users
These flaws can lead to:
• Remote code execution
• System compromise
• Service disruption and downtime
Because Chrome is one of the most widely used browsers, Multiple Vulnerabilities in Google Chrome Desktop put billions of users at risk if left unpatched.
Why These Vulnerabilities Matter
Chrome uses V8 to execute JavaScript in web pages. Type confusion issues in this engine can allow malicious sites to bypass memory protections, opening the door to code execution. When exploited, attackers may gain full control of a system depending on privileges and environment settings.
How to Protect Your System
Google has released updated builds to fix the reported issues. Users should install the latest stable version without delay.
Steps to stay safe:
• Update Chrome immediately through the browser settings
• Enable automatic updates to avoid delays
• Avoid visiting unknown or suspicious websites
• Stay alert for security advisories linked to Multiple Vulnerabilities in Google Chrome Desktop
Keeping the browser updated is the simplest and most effective way to prevent exploitation attempts.
Official Update Sources
Users can download or verify the latest version through Google’s official release channel.

